<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Trust &#8211; The Enemy of Security?</title>
	<atom:link href="http://www.gfi.com/blog/trust-enemy-security/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/trust-enemy-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=trust-enemy-security</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/trust-enemy-security/comment-page-1/#comment-1951</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 11 Jan 2010 10:03:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1793#comment-1951</guid>
		<description><![CDATA[Well put Paul. Phishing and scams work because people trust the source even without proof that an email/letter is coming from were it says it is. That trust then results in those people not questioning what is being asked of them in those scams. If a random person asks anyone for his bank details no one is naive enough to give it to them. If it&#039;s an email from a &quot;bank&quot; they happily comply not realizing that in fact it&#039;s the same scenario!]]></description>
		<content:encoded><![CDATA[<p>Well put Paul. Phishing and scams work because people trust the source even without proof that an email/letter is coming from were it says it is. That trust then results in those people not questioning what is being asked of them in those scams. If a random person asks anyone for his bank details no one is naive enough to give it to them. If it&#8217;s an email from a &#8220;bank&#8221; they happily comply not realizing that in fact it&#8217;s the same scenario!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Paul</title>
		<link>http://www.gfi.com/blog/trust-enemy-security/comment-page-1/#comment-1930</link>
		<dc:creator>Paul</dc:creator>
		<pubDate>Mon, 11 Jan 2010 00:02:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1793#comment-1930</guid>
		<description><![CDATA[I agree.  Too trusting, combined with not enough awareness, is a security nightmare.  How do you protect people when they don&#039;t realise they need protecting?

Its sad but most hacks, phishes and scams are not all that sophisticated, they just have a lot of weak targets out there.]]></description>
		<content:encoded><![CDATA[<p>I agree.  Too trusting, combined with not enough awareness, is a security nightmare.  How do you protect people when they don&#8217;t realise they need protecting?</p>
<p>Its sad but most hacks, phishes and scams are not all that sophisticated, they just have a lot of weak targets out there.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:47:46 by W3 Total Cache --